Routing and Rate Allocation to Provide End-to-End Aniruddha S.

advertisement
Routing and Rate Allocation to Provide End-to-End
Delay Guarantees under PGPS Scheduling
Aniruddha S. Diwan
Kumar N. Sivarajan
ECE Dept, IISc Bangalore
diwan@ece.iisc.ernet.in
Tejas Networks, Bangalore
kumar@tejasnetworks.com
Abwucf- This paper considers the problem of routing sessions with
Quality of Service (QoS) requirements in a network under Packet Generalized Proceqsor Sharing (PGPS) scheduling. PGPS is a non-preemptive
scheduling policy that tracks GPS. The GPS policy operates by allocating
a weight @Ffor a session n whose traffic uses link m. These weights determine the rate at which the traffic from session n is served at link m
and the rate in turn determines the end-to-end delay of packets belonging
to session n. As a deterministic and easily computable end-to-end delay
bound is available for locally stable sessions, we consider the locally stable regime in t h k paper. Two separate problems are considered in this
paper. The first problem deals with the practically important inverse procedure of specifying appropriate weights for sessions at each link on their
paths, that satisfy predetermined delay bounds, when the set of sessions
to be routed is given. Here we show that the fixed routing case can be
formulated as a Iirieur progrum (LP) and the adaptive routing case can he
(MILP). The second problem
formulated as a mixed rrireger lrrieur ~~r(igrurn
examines the performance of PGPS scheduling policy when providing persession QoS guarantees. We measure the performance in terms of weighred
u r r r e d rrufic.. We derive an upper hound on the weighted carried traffic
for mil heuristic algorithm for admission control that operates within the
locally stable domain. This upper bound can be obtained by computing
a linear program (LP). By simulating a simple heuristic algorithm for admission control, we show that this upper bound is reasonably tight. Hence
our upper bound can be used as a metric against which the performance
of different algorithms can he compared.
1. INTRODUCTION
The rise in the popularity of the World Wide Web (WWW)
has resulted in the Web becoming the Internet’s killer application and today the Web occupies more than 75% of Internet backbone traffic. However, because of the time sensitivity
of audiohideo and the huge bandwidth requirements of video,
network delivery of audiohide0 posed considerable technical
challenge. Until fairly recently, the only practical ways to get
musichide0 were to play from a CD-ROM or to download a
very large file across the Internet for playback at the user’s
desktop. But with the emergence of new technologies like audiohideo streaming and with the tremendous increase in the
link speed (e.g., optical fibers), it is now possible to deliver
audiohideo over the Internet directly to desktop. These developments have given rise to a plethora of real-time applications
that provide users a richer and more realistic experience of multimedia. Soon streaming audiohideo will occupy large portion
of the Internet traffic.
However, real-time multimedia requires continuous availability of sufficiently high bandwidth in the channel. This is
especially important for time-critical traffic like streaming audiohideo. Variable audiolvideo packet delays can cause annoying audio starts and stops and picture jitters. The availability of
very high-speed links hasn’t solved this problem because of the
explosive growth of the Internet. Today, an estimated 100 to
This work was carried out at the Indian Institute of Science and supported by
a research grant from Nortel Networks.
0-7803-7097-1/01/$10.00 02001 IEEE
200 million users have access to the Internet. This calls for various network considerations and one of these is the problem of
provisioning of Quality of Service (QoS) to the real-time services. Good QoS provides a guaranteed bandwidth at a constant
small delay even under congested conditions.
The only way to guarantee QoS is by allocating resources
(like bandwidthhuffer) at intermediate routers on per-session
basis and schedulirig the packets at the router interfaces so that
a session gets its share of the router resources. The scheduling policy employed at the router interfaces governs the end-toend delay of the packets. Traditional FIFO scheduling doesn’t
bound this end-to-end delay and it doesn’t provide isolation
as a session can block other sessions by sending a continuous
stream of packets. Various scheduling policies have been proposed in the literature to provide per-session end-to-end delay
(and throughput) guarantees in high-speed networks. Among
these, the class of schemes based on the Generalized Processor
Sharing (GPS) policy are most popular in the literature. GPS
is an idealized fluid discipline with a number of desirable properties such as minimum rate guarantees with perfect isolation
among sessions and deterministic and easily computable endto-end delay bounds. Because these properties are important
in the context of guaranteeing QoS in high-speed networks,
the GPS discipline has become a basis for an entire range of
scheduling policies that are related to GPS.
GPS scheduling was first proposed in [ 13, [2l. In [31 and [SI,
end-to-end delay bounds are derived when the session traffic
is (a,p)-constrained [4]. Work on analysis of GPS for statistically bounded arrivals is reported in [ 5 ] and [6]. Many scheduling policies have been proposed which aim at approximating
GPS fairness in a packetized environment [ 2 ] , [7]. In this paper we consider the simplest scheduling policy called Packet
GPS (PGPS) [ 2 ] .PGPS is a non-preemptive scheduling policy
that tracks GPS. GPS (or PGPS) works by assigning a session
a weight q5 at each link on the session’s route. The weight of a
session at a link on its path decides its share of the link bandwidth at that link which in turn decides the end-to-end delay.
Most of the work on GPS has addressed the problem of obtaining end-to-end delay bound for prespecified session weights.
The first problem that we investigate in this paper deals with
the practically important inverse procedure of determining appropriate weights for sessions at each link on their paths, that
satisfy prespecified delay bounds, when the set of sessions to
be routed is given. All the sessions are assumed to be leaky
bucket constrained. When we assume that a session route is
prespecified, it becomes the case of fixed routing. We show
that the fixed routing case can be formulated as a linear program
(LP). However, prespecifying a route limits the admissibility of
2128
11. GPS SCHEDULING
POLICY
Fig. I . Hypothetical example to illustrate advantage of adaptive routing. All
links are 15 Mbps and all sessions require 5 Mbps.
Consider N sessions contending for a link 1. The GPS
scheduling policy assigns N positive real numbers (weights) ,
4; ,4\, . . . ,& for the N sessions. This is called a GPS assignment for sessions at the server of link 1. The weights signify the
relative amount of service that each session gets, i.e., if $ ( T , t )
is defined as the amount of session i traffic served by the GPS
server at link 1 during an interval [ T , t ] ,then
Sf(Tt )
>&
(1)
si(T,t ) - 4;
a session because enough resources may not be available on
that route. At the same time, another route for the same session may exist with enough resources, which is not considered
in the fixed routing framework. This in turn limits the network
schedulable region which calls for determining a session route
instead of prespecifying one. This can considerably increase
the network schedulable region. We present a motivating example below.
for any session i that is continuously backlogged in the interval
[~,tA
] . session is backlogged at time t if a positive amount
of that session's traffic is queued at time t. Note from (1) that
whenever session i is backlogged it is guaranteed a minimum
service rate of
Fig 1 shows a simple network consisting of 4 nodes and 4
links. Assume each link has a bandwidth of 15 Mbps. Assume
(a,b) and (c, d ) are the only source-destination pairs (SD-pairs)
on which sessions can be present. Assume all sessions require a bandwidth of 5 Mbps. Now consider the fixed routing
case. Suppose the route for ( a ,b) is a -+ c -+ b and that for
( c , d ) is c -+ b -+ d. It can be easily seen that the maximum number of sessions that the network can support simultaneously are ( 3 , 0 ) ,(2, l),(1,2) or ( 0 , 3 ) ,where the first number indicates the maximum on ( a ,b ) and the second number
indicates the maximum on (e,d ) . Now consider the adaptive
routing case. There are two routes for each SD-pair now. The
routes for ( a ,b ) are a -+ c -+ b and a -+ d + b and that
for ( c , d ) are c -+ b -+ d and c + a -+ d. In this case the
the maximum number of sessions supported by the network are
(6,0),(4, a), (2,4) or (0,6). Thus the schedulable region of
fixed outing case is a subset of the schedulable region of adaptive routing.
where rr is the rate of the link. This rate is called the session
i backlog clearing rate since a session i backlog of size q is
served in at most 5 time units. Note that when all 4i are equal,
9i
every backlogged queue is served at the same rate and GPS
becomes a simple Processor Scheduling (PS).
When it is required to determine a session's route as well as
the weights on that route, it becomes the case of adaptive routing. We show that the adaptive routing case can be formulated
as a mixed integer linear program (MILP). The advantage of
both the LP and MILP is that their computational complexity is
independent of the number of sessions in the networks.
The second problem in this paper investigates the performance of PGPS scheduling policy when providing per-session
QoS guarantees. Here, session requests and terminations arrive
at random. We measure the performance in terms of weighted
carried traffic. We derive an upper bound on the weighted
carried traffic for any heuristic algorithm for admission control that operates within the locally stable domain. This upper
bound can be obtained by computing a simple linear program
(LP). By simulating a simple heuristic algorithm for admission control, we show that this upper bound is reasonably tight.
Thus our upper bound can be used as a metric against which
the performance of different algorithms can be compared.
0-7803-7097-1/01/$10.00 02001 IEEE
21 29
gE =
--+$
4l.
(2)
Cj=l4j
111. PGPS END-TO-ENDDELAYBOUND
Consider a set of sessions that are to be routed through a
network. All sessions are leaky bucket constrained with parameters (oi,
p i ) for session i . A session i is leaky bucket
constrained with parameters ( o i , p i ) if the amount of traffic that session i injects in the network, A i ( ~ , t during
),
any
interval(r,t], is bounded as A i ( ~ , t5) gi p i ( t - r),W 2
T >_ 0. The network is stable if the utilization of all links
is less than 1, where the utilization on link I, U' is defined as
+
ci':/')
U' =
1
'
, where 1(1)is the set of sessions that are going through link 1 ( [ 2 ] , [3]). Now consider a GPS assignment
for each session at all links on its path. We focus our attention
on a particular session i . This session traverses the network
through a set of I< links denoted as P ( i ) . Let the propagation delay along the path of session i be drrop. At each link
1 E P ( i ) ,the GPS server of that link guarantees a minimum
rate gl at which session i traffic is served. Note that with the
GPS assignment being known, the use of eqn (2) gives us g i .
Hence the minimum session i backlog clearing rate along its
route is gi = minl,p(i) gf To take packetization into account,
we consider the packetized version of GPS namely Packet GPS
(PGPS) in this paper. PGPS is a non-preemptive policy that
tracks GPS. Let Li be the size of maximum length packet from
session i and L be the size of maximum length packet among
all sessions. A session is defined to be locally stable if gi > pi.
Locally stable sessions have a simple and closed form bound
on end-to-end delay as stated in the following theorem [3].
Theorem 111.1: If gi 2 pi for session i , then
DT 5
oi
+ I<Li +
gi
{+dyP
/EP(i)
'
where 0,' is the maximum end-to-end delay that a session i
packet may suffer while traversing the network. In other words,
the GPS weight assignment provides an end-to-end delay guarantee of 05 for session i . Thus, given a predetermined endto-end delay bound Dreqd,we can use the above expression to
compute the minimum rate required to obey the delay bound
for session i . For example, for a voice session having c = 100
Bytes, p = 64 Kbps, P e q d = 50 ms, Li = 100 Bytes and
L = 1.5 KBytes, going over a 3-link route, gi turns out to be
85 Kbps. In this paper, the network operates under the locally
stable regime.
Class
1: voice
2: video conf
3: st video
a(kB)
0.1
IO
1 00
p(Mbps)
0.064
0.5
3
D(ms> L(kB)
50
0.1
75
1.5
100
1.5
IV. PGPS WEIGHTASSIGNMENT
PROBLEM
A. An LP Formulation f o r Fixed Routing
A session i is characterized by a 4-tuple ( a i , p i , D i ,Li)
where ai and p i are the leaky bucket parameters of session i ,
Dj is the maximum end-to-end delay requirement of session i
and Li is the maximum length of a packet of session i. Sessions
are grouped into traffic classes (e.g., table I). Sessions belonging to a traffic class have identical 4-tuples. Denote by C, M , L
the number of traffic classes, the number of available paths and
the number of links in the network respectively. A fixed routing
problem is one in which the path that a session is going to use
is prespecified. There is no choice as to which path should be
chosen for a session. Our aim is to check the schedulability of
a given set of sessions and to obtain a GPS assignment if the set
of sessions is schedulable. We now formulate this problem as
follows. bij is an indicator where bij = 1 if path i uses link j
and bij = 0 otherwise. nij is the number of class i sessions that
use path j . Without loss of generality, on a link, we assign the
same 4 to the sessions belonging to a class that use the same
path. Hence we can couple the q!J assignments for the sessions
of a class i on link l and having the same path into a single
4. Let & j l be this coupled assignment. 4 i j l is zero if class i
session doesn't use path j or if link 1 doesn't belong to path j .
Our linear formulation computes a q!Jij/ assignment. We make
use of the delay guarantee bound of theorem 111.1 to compute
the rate g i j needed for a class i session on path j to achieve
its delay bound. So the GPS assignment will be such that all
sessions are locally stable. Denote by r' the capacity of link 1.
The link capacities r1 and the bij and nij are given. The 4 i j l is
to be computed in such a way that all sessions get routed while
the utilization on each link remains less than 1 and the end-toend delay requirements are obeyed. So we have the following
linear formulation.
Find @ = ( & l ) such that:
4ijir'
2
nijbjl m a ( p i , g i j )
Vi E C,j E M,l E L
(3)
(4)
4ijl
5
nijbjl
vi E c,j E M,1 E L
(5)
(3) allocates so that the end-to-end delay requirements are
obeyed. (4) normalizes the q5 assignments at all links and with
#J
0-7803-7097-1/01/$10.00
02001 IEEE
Fig. 2. Example to illustrate q5 assignment in fixed routing case. Links are 155
Mbps and link delays are 4 ms. Sessions belong to the classes of table 1.
(a,,b ) and (c, d ) are the only SD-pairs on which sessions can be present
and there i s only 1 route per SD-pair which is prespecified. We allow 40
voice sessions, 2 vc sessions and 8 stv sessions on SD-pair ( a , b ) ; and 41
voice sessions, 2 vc sessions and 8 stv sessions on SD-pair ( e ,d ) . With
this, no more sessions can be admitted.
( 3 ) ,it keeps link utilization below 1. Note that there is no loss of
generality in this normalization. ( 5 )forces $ i j i to 0 at appropriate links. Any @ satisfying the above constraints gives us a GPS
assignment that achieves the end-to-end delay requirements of
the sessions. Note that this formulation is linear in 4 and a
assignment can be computed by solving a linear program (LP)
with above set of constraints. Also the computational complexity of the LP is independent of the number of sessions present
in the network.
We illustrate the usefulness of the L P formulation for a simple network of fig 2. All links have bandwidth = 155 Mbps and
link propagation delay = 4 ms. Assume ( a ,b ) and (e,d ) are the
only SD-pairs on which sessions can be present. The sessions
belong to the classes of table I. Session routes are fixed and
suppose sessions on ( a , b ) follow the route a -+ c + b and
sessions on (e,d ) is c -+ b -+ d. All routes span over two hops.
The rate required by a voice session is 64 Kbps as given by the
maximum of its p and rate computed from eqn 111.1. Similarly,
a video conferencing (vc) session requires a rate of 1.558Mbps
and a stored video (stv) session requires a rate of 8.9716 Mbps.
We consider the following set of sessions: On SD-pair ( a ,b ) ,
40 voice sessions, 2 vc sessions and 8 stv sessions; on SD-pair
(c, d), 41 voice sessions, 2 vc sessions and 8 stv sessions, that
is these are the nij for our example, see fig 2. By solving the
LP, it can be seen that the above 7 z i j set is a feasible set and the
respective 4 weights given by the LP are shown in table 11. We
also note that no more sessions can be admitted on any SD-pair;
if admitted, total session rate on any link exceeds the link rate.
In the next section, we show how adaptive routing can be used
to increase the schedulable region.
2130
TABLE I1
4 A S S I G N M E N T FOR
THE FIXED KOUTING h X A M P L E .
TABLE111
f#I A S S I G N M E N T F O R THE
I session
ADAPTIVI;. R O U T I N G
I
video conf
st video
EXAMPLE.
0.1 105
0.8689
0.0402
0.9264
0.1 104
0.8685
Fig. 3. Fixed routing example continued to illustrate routing & f#I assignment
in adaptive routing case. Here 2 routes per SD-pair are allowed. Because
of this, we can 10 voice sessions, 9 vc sessions and 7 stv sessions on the
new route for SD-pair ( a , b ) and 10 voice sessions, 9 vc sessions and 7 stv
sessions on the new route for SD-pair (c, d ) . This makes total 50 voice
sessions. 11 vc sessions and 15 stv sessions on SD-pair (a. b ) and total 51
voice sessions, 11vc sessions and 15 stv sessions on SD-pair ( c , d ) .
I
d on link
0.1806
0.8 1 1 1
B. Ail MILP Formulation for Adaptive Routing
In the adaptive routing case, it is not known which session
uses which path. But the source and destination of a session
are known. Also the paths that are available for a SD-pair are
known. The adaptive routing problem is to select paths for
the sessions such that the end-to-end delay requirements are
obeyed. Hence the adaptive routing formulation is based on
a class-SD-pair formulation. We define sij and a,ij as follows.
s i j is the number of class i sessions whose SD-pair is j . aij = 1
if path i is for SD-pair j . g i j , b i j , nij, @, r' are defined as in section IV-A. Note that, here @ as well as N are to be computed
in such a way that all sessions get routed while the utilization
on each link remains less than 1 and the end-to-end delay requirements are obeyed. N gives the routing information and
@ gives the GPS assignment. So we have the following linear
formulation.
Find N and
such that:
i=l j = 1
4ijl
5
nijbji
Vi E C , j
E M,l E L
(9)
Note that in the above formulation 4 are real nonnegative variables and n i j are integer variables. (6) is the only additional
constraint which decides the routing of sessions. The above
formulation is linear in 4 and nij . Since nij is an integer variable, @ and N assignments can be computed by a mixed integer
linear program (MILP) with above set of constraints. Note that
the computational complexity of the MILP is independent of
the number of sessions present in the network.
We continue with the example of last section to illustrate the
advantage of adaptive routing. We allow one more route per
SD-pair as follows. Sessions on ( a ,6 ) can also use a -+ d -+ 6
0-7803-7097-11011$10.00 02001 IEEE
2131
and sessions on ( c , d ) can also use c -+ a - + d. We add 10
voice sessions, 9 vc sessions and 7 stv sessions on the new route
for SD-pair ( a ,6 ) . Similarly we add 10 voice sessions, 9 vc
sessions and 7 stv sessions on the new route for SD-pair (c,d )
as in fig 3. So on SD-pair ( a , 6 ) total voice sessions are 50,
total vc sessions are 11 and total stv sessions are 15. On SDpair ( c ,d ) total voice sessions are 51, total vc sessions are 11
and total stv sessions are 15. This gives us the s i j and nij sets.
By solving the MILP, it can be seen that this is a feasible set.
The MILP also gives the 4 weights which are shown in table 111.
Also, we can add no more sessions of any class on any SD-pair.
Hence this set is an extreme point. Thus with adaptive routing
we were able to admit more sessions.
Note that in both routing cases, max(pi, g i j ) rate is allocated
to an admitted session. When gij > p i , additional bandwidth
= g i j - p i is allocated for a class i session. This additional
bandwidth remains unused and because of such sessions, network utilization may remain low. We call such sessions delay
constrained sessions. Thus a voice session of table I becomes
delay constrained when it has to go overmore than 2 hops. Both
video sessions of table I are delay constrained for any number
of hops. Let us consider 3 hop case. The rate required for
voice is 0.085 Mbps, for video conferencing 1.85 Mbps and for
stored video it is 9.53 Mbps. So 0.021 Mbps per voice session,
1.35 Mbps per video conf. session and 6.53 Mbps per stored
video session bandwidth remains unused. We note that this is
the price one has to pay for achieving delay guarantees under
PGPS scheduling.
V.
PERFORMANCE O F
PGPS
SCHEDULING
A. The Upper Bound
In this section we investigate the performance of PGPS policy under the locally stable regime. We assume the sessions
arrive and depart at random. The goal is to maximize the
weighted carried traffic, for a given offered load (in Erlangs)
of respective classes on each SD-pair. The weight reflects in
some sense the amount of resources (bandwidth) required for
that particular traffic class. The maximization problem is formulated as an Integer Linear Program (ILP). However, solving
an ILP is computationally expensive. So we relax the integer
constraints of the ILP to get a simple LP. The L P solution is an
upper bound on the ILP solution. We then go on to show that
this is a tight upper bound for any heuristic algorithm operating
in the locally stable domain.
Note that in the case of PGPS routing & weight assignment
problem, we were able to formulate fixed routing case as an LP
even though it was a special case of adaptive routing case. In
this section we only consider the adaptive routing case because
there is no gain in formulating the two cases separately. Fixed
routing case is treated as a special case of adaptive routing.
Before proceeding further we define a few terms here.
C ,M , P, L , ( a i j ) ,( b i j ) are defined as before. p i , oi, Di, Li are
the traffic descriptors and g i j is the rate required to obey endto-end delay bound for class i session on path j as before. Let
X denote the total offered load in Erlangs. The ( p i j ) matrix
gives the distribution of offered load among different classes
for the SD-pairs. So pijX is the offered load of class 1: traffic
on SD-pair j . The offered load for the static case (a fixed set
of sessions) is the number of sessions that are available to be
routed. In the dynamic case, it is the expected number number
of sessions that would be in progress if one could successfully
route all session arrivals. Let s i j denote the number of class i
sessions carried between SD-pair j . Also nij denotes the number of class i sessions carried on path j . In the dynamic case,
sij and n i j are the expectations of the respective quantities.
We measure the performance of PGPS policy under locally
stable regime in terms of weighted carried traffic. The weight
reflects in some manner the amount of resources (bandwidth)
required for that particular traffic class. We fix weight for traffic class i equal to p i . We want to find the optimal algorithm
for rate allocation so that the end-to-end delay bounds of admitted sessions are obeyed and the weighted carried traffic is
maximized. In the practically important dynamic case, where
sessions arrive at random, hold bandwidth along their paths for
random durations and then depart, we are interested in maximizing the weighted expected carried traffic. Then, the optimal
algorithm for the bandwidth allocation problem is found by by
solving the following ILP (integer linear program) whose value
we denote by I ( X , p ) .
(Maximize weighted carried traffic)
C
I ( X , P )=
P
m a x C ~ i C s i j
i=l
j=1
subject to
M
sij
=
nikakj
~i E C , Y E
~ P (10)
k=l
Sij
C
C
5
pijX
<
T'
'di€C,'dj E P
(1 1)
M
Cgijl~ijbj,
i=l j=1
Yl E L
(12)
where s i j , nij 2 0 and are integer variables.
Note that any heuristic algorithm for allocating rates under
the locally stable PGPS regime has to satisfy the constraints of
the above ILF? So the solution of above ILP produces an upper
bound on the weighted carried traffic of any heuristic algorithm
0-7803-7097-1/01/$10.00
02001 IEEE
-~
4
Fig. 4. Network to illustrate the performance of PGPS rate allocation. It has 5
nodes and 8 links. Links are 155 Mbps and link delays are 4 ms.
that operates within the locally stable domain. But solving ILP
may be computationally expensive and hence we are interested
in an easily computable upper bound. If we relax the integer
constraints of above ILP, we get an upper bound on the solution of ILP and hence an upper bound on the performance of
any heuristic algorithm for rate allocation that operates within
the locally stable domain. Let us denote this upper bound by
L(X,p ) . Though computationally inexpensive, the L P bound is
really useful if it is reasonably tight. In the next section, we
consider a heuristic algorithm for bandwidth allocation and we
show by simulations that the LP upper bound is indeed reasonably tight. This LP upper bound can be used as a metric
against which the performance of different algorithms can be
compared.
B. Comparison with a Heuristic Rate Allocation Algorithm
Here we show the utility of the LP upper bound that is derived in the last section. The network is shown in fig 4 and the
traffic descriptors are as in table 1. We consider the following
shortest-path heuristic bandwidth allocation algorithm. The set
of shortest paths between an SD-pair is ordered in some manner. The required rate to provide end-to-end delay guarantee for
the traffic of an arriving session is computed for the first path
on the list. If there is enough rate available along the path, the
session is admitted on that path. Otherwise, we check for the
second path of the list and so on. If no path can be found, the
session is considered blocked. We simulated the performance
of this simple algorithm for traffic where session requests are
assumed to arrive according to a Poisson process and last for a
duration that is exponentially distributed. We consider only the
case of uniform traffic, i.e., pij = 1/(CP) here although the
upper bound is applicable to any traffic pattern.
Fig 5-6 show the weighted carried traffic as a function of
offered traffic for above heuristic algorithm and their upper
bound. For example, in Fig 5 we compare the performance
of above heuristic where at most 2 shortest paths are allowed
between any SD-pair. It can be seen that the performance of
the heuristic is close to that achievable by anj~algorithm for
this network up to reasonably high offered load. It is possible
to conclude thus because our upper bound is reasonably tight
here. Moreover, we have observed that the offered load where
the upper bound is tight has reasonably low blocking probability. We would indeed like to operate in low blocking probability region. The part where the upper bound is not so tight is not
of much interest and hence we can safely conclude that over
region of interest, our upper bound is reasonably tight. Now
consider fig 7 which shows the performance bound of various
2132
c
optimal algorithms. It can be seen that we don’t gain much
by considering complicated algorithms which try to use many
paths between an SD-pair. In our example, the performance,
when at most 2 paths between any SD-pair are allowed, is almost the same as that obtained by considering all paths between
an SD-pair.
4
++
++++++
+++++++++++++++++
i
VI. C O N C L U S ~ O N
4
heuristic: 2
bound: 2
2
0
4
6
8
10
14
12
16
18
20
Offered Traffic (Erlangs)
Fig. 5. Weighted carried traffic of heuristic and its bound computed by the LP
are plotted. At most 2 paths between any SD-pair are considered. Heuristic
performs well for low offered traffic.
U
E
e
2.5 -
/Ir
. . . . . . . . . . . . . . . . . . . . . . .
:/++++
2 -
:+
1.5
-
j
I -:
i
0.5
0
heuristic: 3 paths
bound: 3 paths
I
I
I
I
I
2
4
6
8
IO
+
----~---
I
12
I
I
I
14
16
18
20
Offered Traffic (Erlangs)
Rg. 6. Weighted carried traffic of heuristic and its bound computed by the LP
are plotted. At most 3 paths between any SD-pair are considered. Heuristic
performs well for low offered traffic.
We have addressed the problem of routing sessions with delay and rate requirements in a network under PGPS scheduling.
In the first problem that we have considered, we try to find a
GPS weight assignment (4 assignment) for a given set of sessions so that their delay requirements are obeyed. Fixed routing
case and adaptive routing case are dealt separately. It is shown
that the fixed routing 4 assignment can be obtained by computing an LP. In the case of adaptive routing, it is shown that
the routing information and 4 assignment can be obtained by
computing an MILP. The computational complexity of both the
LP and MILP is independent of the number of sessions present
in the network. It is observed that for delay constrained sessions, PGPS allocates more additional bandwidth to achieve
delay guarantees. The links remain underutilized because of
this unused extra bandwidth.
The second problem that is addressed here is the performance of PGPS scheduling policy. We obtain an upper bound
on the performance of any heuristic bandwidth allocation algorithm that operates within the locally stable domain. The
bound can be obtained by solving an LP. The utility of our upper bound is shown by comparing it with the performance of
a simple shortest path heuristic algorithm. The performance of
this simple shortest path heuristic is close to that achievable by
aiiy algorithm. We can conclude thus because our upper bound
is reasonably tight here. Hence our upper bound can be used
as a metric against which the performance of different algorithms can be compared. Moreover, it can be seen from the
upper bound curves that the gain in weighted carried traffic is
not much for more number of paths between an SD-pair.
REFERENCES
3‘f
A. Demers, S. Keshav and S. Shenker, “Analysis and Simulation of a Fair
Queueing Algorithm,” Proc. ACM SlGCOMM’89, pp. 3-12, 1989.
A. K. Parekh and R . G. Gallagher,“A Generalized Processor Sharing Approach to Flow Control in Integrated Services Networks: The Single
Node Case,” IEEE Trans. o r 1 Networking, Vol. I , No. 3, pp. 137-150,
4
(#
2.5
2
1993.
bound: 1 path
bound: 2 paths
bound: 3 paths
bound: all paths
[33
----t
---%----
-
--e---
a-----
/
0
2
4
6
8
10 12 14
Offered Traffic (Erlangs)
16
18
1994.
2. L. Zhang, D. Towsley and J. Kurose, “Statistical Analysis of the Generalized Processor Sharing Scheduling Discipline,” IEEE JSAC, Vol. 13,
NO. 6, pp. 1071-1080, Aug. 1995.
20
S. J . Golestani, “A Self-clocked Fair Queueing Scheme for Broadband
Fig. 7. Bounds on the weighted carried traffic of any heuristic algorithms are
plotted. Observe that the gain in considering more paths is not much.
0-7803-7097-1/01/$10.00 02001 IEEE
A. K. Parekh and R. G. Gallagher,“A Generalized Processor Sharing Approach to Flow Control in Integrated Services Networks: The Multiple
Node Case,” IEEE T r a m on Networking, Vol. 2, No. 2, pp. 347-357,
1993.
R. L. Cruz, “A Calculus for Network Delay, Part I: Network Elements in
Isolation.” IEEE Trans. Iizfwm. Theory, Vol. 37, pp. 114-131, 1991.
0. Yaron and M. Sidi. “Generalized Processor Sharing Networks with Exponentially Bounded Burstiness Arrivals.” Proc. IEEE INFOCOM, June
21 33
Applications,” Proc. lEEE INFOCOM. pp. 636446, 1994.
2.L. Zhang, 2. Liu and D. Towsley, “Closed-Form Deterministic End-toEnd Performance Bounds for the Generalized Processor Sharing Scheduling Discipline.” Joirriiul of Contbinaforial Opfirni?afion.Special lssue on
Scheduling.
Download